On managing physical and cyber threats to energy systems identification and countermeasure requirements

Henryka Jormakka (Corresponding Author), Pekka Koponen, Heimo Pentikäinen, Hanna Bartoszewicz-Burczy

    Research output: Contribution to journalArticleScientificpeer-review

    1 Citation (Scopus)

    Abstract

    Control centers of energy systems are subjects to different kind of threats such as natural disasters, hackers, or terrorist attacks, or finally unintentional personnel errors. The article introduces some protections methods against those threats. It proposes a protocol to be used for routine self-assessment to provide companies with feedback on the effectiveness of their security policy. The protocol can be used as well during security audits for detection of energy systems infrastructure vulnerabilities. Both, physical and cyber attacks are taken into consideration.
    Original languageEnglish
    Pages (from-to)27-33
    Number of pages7
    JournalEksploatacja i Niezawodność
    Volume47
    Issue number3
    Publication statusPublished - 2010
    MoE publication typeA1 Journal article-refereed

    Fingerprint

    Disasters
    Identification (control systems)
    Personnel
    Feedback
    Industry

    Keywords

    • control systems
    • security

    Cite this

    Jormakka, Henryka ; Koponen, Pekka ; Pentikäinen, Heimo ; Bartoszewicz-Burczy, Hanna. / On managing physical and cyber threats to energy systems identification and countermeasure requirements. In: Eksploatacja i Niezawodność. 2010 ; Vol. 47, No. 3. pp. 27-33.
    @article{dc3f5f574ac248e3950daa50b3a6de0b,
    title = "On managing physical and cyber threats to energy systems identification and countermeasure requirements",
    abstract = "Control centers of energy systems are subjects to different kind of threats such as natural disasters, hackers, or terrorist attacks, or finally unintentional personnel errors. The article introduces some protections methods against those threats. It proposes a protocol to be used for routine self-assessment to provide companies with feedback on the effectiveness of their security policy. The protocol can be used as well during security audits for detection of energy systems infrastructure vulnerabilities. Both, physical and cyber attacks are taken into consideration.",
    keywords = "control systems, security",
    author = "Henryka Jormakka and Pekka Koponen and Heimo Pentik{\"a}inen and Hanna Bartoszewicz-Burczy",
    year = "2010",
    language = "English",
    volume = "47",
    pages = "27--33",
    journal = "Eksploatacja i Niezawodność",
    issn = "1507-2711",
    publisher = "Polish Maintanace Society",
    number = "3",

    }

    On managing physical and cyber threats to energy systems identification and countermeasure requirements. / Jormakka, Henryka (Corresponding Author); Koponen, Pekka; Pentikäinen, Heimo; Bartoszewicz-Burczy, Hanna.

    In: Eksploatacja i Niezawodność, Vol. 47, No. 3, 2010, p. 27-33.

    Research output: Contribution to journalArticleScientificpeer-review

    TY - JOUR

    T1 - On managing physical and cyber threats to energy systems identification and countermeasure requirements

    AU - Jormakka, Henryka

    AU - Koponen, Pekka

    AU - Pentikäinen, Heimo

    AU - Bartoszewicz-Burczy, Hanna

    PY - 2010

    Y1 - 2010

    N2 - Control centers of energy systems are subjects to different kind of threats such as natural disasters, hackers, or terrorist attacks, or finally unintentional personnel errors. The article introduces some protections methods against those threats. It proposes a protocol to be used for routine self-assessment to provide companies with feedback on the effectiveness of their security policy. The protocol can be used as well during security audits for detection of energy systems infrastructure vulnerabilities. Both, physical and cyber attacks are taken into consideration.

    AB - Control centers of energy systems are subjects to different kind of threats such as natural disasters, hackers, or terrorist attacks, or finally unintentional personnel errors. The article introduces some protections methods against those threats. It proposes a protocol to be used for routine self-assessment to provide companies with feedback on the effectiveness of their security policy. The protocol can be used as well during security audits for detection of energy systems infrastructure vulnerabilities. Both, physical and cyber attacks are taken into consideration.

    KW - control systems

    KW - security

    M3 - Article

    VL - 47

    SP - 27

    EP - 33

    JO - Eksploatacja i Niezawodność

    JF - Eksploatacja i Niezawodność

    SN - 1507-2711

    IS - 3

    ER -